![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://beehaw.org/pictrs/image/c0e83ceb-b7e5-41b4-9b76-bfd152dd8d00.png)
I thought it already did that
Fediverse Advocate
I thought it already did that
I like the optical ones as it works with wet hands
Conduit seems to have next to no docs on actually installing it for some reason.
There’s still time to delete this
My cat is NOT a soyboy.
I know someone who had a Minecraft server which used a .net domain (most Minecraft servers do use .net, even one I hosted did) and he renamed it once and used an .xyz domain and it suddenly looked like a sketchy Russian porn site
Xyz domains always look sketchy, sorry.
My da has a mate who’s literally a peeler and was showing him his piracy set-up. His mate was also talking about his.
It is actually better for durability if the outer shell is removable as well. Eg, having a durable phone case on a midrange phone is better than a rugged phone. Simply being as you can easily swap the case
I’m going off of hearsay here from a video I saw years ago, but it was comparing a decently durable android in a rugged case with a purpose built rugged android phone. Both sustained similar damage but at least the one with the case could be fixed by a case swap. Other one would need a full on repair.
If I ever became an indie developer I might have some basic anti piracy detection that triggers some form of joke cutscene but makes the game playable so nobody ever tries to patch it out
Linux isn’t free because it uses your electricity
What about email?
How good is it? I have a raspi5 and wonder where it’s limit is
Ads are fine in the form of search results that are clearly marked as sponsored. The issue with ads are when they are manipulative, intrusive, obnoxious or have sketchy data collecting
I think stuff like this would be more appropriate for voice control devices, namely Google Assistant
Wasn’t Google’s original appeal the lack of clutter?
Lol clever. Fresh fish! Sure they didn’t toss him one? 🤣
Did he catch the fish or steal them from a market…
Had an american who loved our robin redbreasts
If your SSH is using key authentication and you don’t have anything silly as an attack vector, you should be grand.